{"id":11274,"date":"2019-05-12T05:55:06","date_gmt":"2019-05-12T09:55:06","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=11274"},"modified":"2021-07-16T04:01:59","modified_gmt":"2021-07-16T08:01:59","slug":"a-guide-to-customer-identification-procedure-using-biometric-for-kyc","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/","title":{"rendered":"A guide to customer identification procedure using biometric for KYC"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Famous author Eric Ries once said, \u201cIf you don\u2019t know who your customer is, you don\u2019t know what quality is.\u201d For business endeavors knowing your customer (KYC) is the key. Successful businesses put a great deal of effort into understanding their customer very well so that they can offer them the best service. If you are thinking about how to know more about your customer, here is the complete guideline for you.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-11275 alignright\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/04\/A-guide-to-customer-identification-procedure-using-biometric-for-KYC.jpg\" alt=\"A guide to customer identification procedure using biometric for KYC\" width=\"423\" height=\"321\"><\/p>\n<h2><b>Set Goal<\/b><\/h2>\n<p><span style=\"font-weight: 400\">First things first, define what you want to know from them. It can differ from business to business. For example, if you are in a retail business you might be interested to see the reason for purchasing your product, how often they buy from your store, what are the types of product they usually buy, what are their favorites product, etc. The whole idea is to know as much as possible about them and then serve them accordingly.<\/span><\/p>\n<h2><b>Establish Convenient Identification Process<\/b><\/h2>\n<p><span style=\"font-weight: 400\">While establishing the customer identification process, make sure it is convenient and secure. Customer hates time-consuming procedures. They would hate it if you asked the same questions every time they purchase from your store or access your bank. &nbsp;For example, asking for their name, their phone number, etc. Using biometric technology is the best way to bring convenience in the process. The process will take less than a minute to proceed. The system only required their biometric for identification instead of asking their name or phone number or lengthy questions.<\/span><\/p>\n<h2><b>Choose the Right identification Technology<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Based on your business type you can choose single modality based biometric technology or the <\/span><a href=\"https:\/\/www.m2sys.com\/hybrid-biometric-platform\/\"><b>multi-modal biometric system<\/b><\/a><span style=\"font-weight: 400\">. For example, in healthcare iris recognition is popular because the lack of contact in the procedure inhibits the spread of germs. On the other hand in retail, businesses mostly choose fingerprint since it is a convenient and popular form of identification. However, you can select a multimodal biometric system to open more doors for your customers.<\/span><\/p>\n<h2><b>Buy the Right Device<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Now you are almost ready. Now buy the best biometric devices for your process. Make sure you buy the best one from the market that serves your objective. Make sure your devices have <\/span><a href=\"https:\/\/www.m2sys.com\/finger-vein-reader\/\"><b>liveness detection technology<\/b><\/a><span style=\"font-weight: 400\">. Liveness detection technology <\/span><a href=\"https:\/\/www.m2sys.com\/blog\/scanning-and-efficiency\/liveness-detection-fight-biometric-spoofing\/\"><b>will save you from spoofing<\/b><\/a><span style=\"font-weight: 400\">. Using the anti-spoofing device will help you to avoid the unauthorized consumption of unique service such as discount offers, promotional offers, etc.<\/span><\/p>\n<h2><b>Choose the Right Vendor<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Now you are about to go for the vendor who would help you in biometric integration in customer identification. Before considering any vendor for your company consider these factors<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><strong>Knowledge<\/strong><\/li>\n<li style=\"font-weight: 400\"><strong>Experience<\/strong><\/li>\n<li style=\"font-weight: 400\"><strong>Specialized<\/strong><\/li>\n<li style=\"font-weight: 400\"><strong>Reputation in the market<\/strong><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">M2SYS technology is the market leader in the identity management market. They have over 17 years of experience in the field of biometric technology. They have the knowledge, experience, and huge reputation in the market. So, choose M2SYS for your customer identification project for the best outcome.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Using biometric technology you can quickly establish the customer identification process in your business. As a business owner, it is crucial to take every advantage to outsmart your competitors, and understanding and building upon your customer knowledge and relationships will put you ahead of the game.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Famous author Eric Ries once said, \u201cIf you don\u2019t know who your customer is, you don\u2019t know what quality is.\u201d<\/p>\n","protected":false},"author":402,"featured_media":15352,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"biometric for KYC","_yoast_wpseo_title":"A guide to customer identification procedure using biometric for KYC","_yoast_wpseo_metadesc":"Curious to know how you can identify customer using biometric for KYC ? Get your full guide to establish solid customer identification procedure.","_lmt_disableupdate":"","_lmt_disable":"","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[67],"tags":[1226,1225,1224,1227],"class_list":["post-11274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-hardware","tag-biometric-based-kyc","tag-biometric-identification-for-kyc","tag-biometric-kyc","tag-customer-identification-procedure"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A guide to customer identification procedure using biometric for KYC<\/title>\n<meta name=\"description\" content=\"Curious to know how you can identify customer using biometric for KYC ? Get your full guide to establish solid customer identification procedure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A guide to customer identification procedure using biometric for KYC\" \/>\n<meta property=\"og:description\" content=\"Curious to know how you can identify customer using biometric for KYC ? Get your full guide to establish solid customer identification procedure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-12T09:55:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-16T08:01:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/05\/A-guide-to-customer-identification-procedure-using-biometric-for-KYC-800x445-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fredric Hoffman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fredric Hoffman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/\"},\"author\":{\"name\":\"Fredric Hoffman\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f4c7b2d7ce7c367c92c1f4818c519305\"},\"headline\":\"A guide to customer identification procedure using biometric for KYC\",\"datePublished\":\"2019-05-12T09:55:06+00:00\",\"dateModified\":\"2021-07-16T08:01:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/\"},\"wordCount\":543,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric based kyc\",\"biometric identification for kyc\",\"biometric kyc\",\"customer identification procedure\"],\"articleSection\":[\"Biometric Hardware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/\",\"name\":\"A guide to customer identification procedure using biometric for KYC\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2019-05-12T09:55:06+00:00\",\"dateModified\":\"2021-07-16T08:01:59+00:00\",\"description\":\"Curious to know how you can identify customer using biometric for KYC ? Get your full guide to establish solid customer identification procedure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"A guide to customer identification procedure using biometric for KYC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f4c7b2d7ce7c367c92c1f4818c519305\",\"name\":\"Fredric Hoffman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/58790a590d10ba7399cf28dd264668a0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/58790a590d10ba7399cf28dd264668a0?s=96&d=mm&r=g\",\"caption\":\"Fredric Hoffman\"},\"description\":\"Fredric Hoffman Fredric Hoffman is a digital marketing analyst at M2SYS Technology and a tech enthusiast, he loves analyzing, researching and writing on technology. He believes that adaptation of cutting-edge technology can transform this world into a new shape and make it live worthy for all. View Profile\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/noman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A guide to customer identification procedure using biometric for KYC","description":"Curious to know how you can identify customer using biometric for KYC ? Get your full guide to establish solid customer identification procedure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/","og_locale":"en_US","og_type":"article","og_title":"A guide to customer identification procedure using biometric for KYC","og_description":"Curious to know how you can identify customer using biometric for KYC ? Get your full guide to establish solid customer identification procedure.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2019-05-12T09:55:06+00:00","article_modified_time":"2021-07-16T08:01:59+00:00","og_image":[{"width":800,"height":534,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/05\/A-guide-to-customer-identification-procedure-using-biometric-for-KYC-800x445-2.jpg","type":"image\/jpeg"}],"author":"Fredric Hoffman","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Fredric Hoffman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/"},"author":{"name":"Fredric Hoffman","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f4c7b2d7ce7c367c92c1f4818c519305"},"headline":"A guide to customer identification procedure using biometric for KYC","datePublished":"2019-05-12T09:55:06+00:00","dateModified":"2021-07-16T08:01:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/"},"wordCount":543,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric based kyc","biometric identification for kyc","biometric kyc","customer identification procedure"],"articleSection":["Biometric Hardware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/","name":"A guide to customer identification procedure using biometric for KYC","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2019-05-12T09:55:06+00:00","dateModified":"2021-07-16T08:01:59+00:00","description":"Curious to know how you can identify customer using biometric for KYC ? Get your full guide to establish solid customer identification procedure.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/a-guide-to-customer-identification-procedure-using-biometric-for-kyc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"A guide to customer identification procedure using biometric for KYC"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f4c7b2d7ce7c367c92c1f4818c519305","name":"Fredric Hoffman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/58790a590d10ba7399cf28dd264668a0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58790a590d10ba7399cf28dd264668a0?s=96&d=mm&r=g","caption":"Fredric Hoffman"},"description":"Fredric Hoffman Fredric Hoffman is a digital marketing analyst at M2SYS Technology and a tech enthusiast, he loves analyzing, researching and writing on technology. He believes that adaptation of cutting-edge technology can transform this world into a new shape and make it live worthy for all. View Profile","url":"https:\/\/www.m2sys.com\/blog\/author\/noman\/"}]}},"modified_by":"Robert Brown","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/11274"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/402"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=11274"}],"version-history":[{"count":3,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/11274\/revisions"}],"predecessor-version":[{"id":15353,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/11274\/revisions\/15353"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15352"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=11274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=11274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=11274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}